6 views

Uploaded by Kwesi Setsoafia Agudetse

- CNS MCQ QUIZ
- Cryptography Quest Bank 02
- hmw3_sol
- VIDEOSECURITY_SYNOPSIS
- Cryptography Tutorial
- Cryptography Tutorial
- Cast-As-Intended Mechanism With Return Codes Based on PETs
- Hill Cipher
- Exercise 1
- 50120130406002
- V01I031126
- IJACSA_Volume2No11
- CCNASv1.1 Chp07 Lab-A Explor-Encrypt Instructor
- Key Stream
- DBMS Encryption
- Cryptography
- Cryptosystems based on Chebyshev Polynomials - Report
- IJCST-V2I4P11 Author:P.J.Thangamani;G.Nagalakshmi
- An More effective Approach of ECC Encryption Algorithm using DNA Computing
- Secure Auditing In Cloud

You are on page 1of 9

Basic Education College College of Education

Science Department Mathematics Department

Abstract:

In this paper we present a comparison between block and stream ciphers through

advantages and disadvantages of both .

1-Introduction:

In1999 the Bluetooth specification was published in the documents describing the new

short range link solutions the researchers presented a stream cipher called E0 which

was designed to provide the wireless connection with a strong protection against

eavesdroppingE0.

The E0 encryption system is built around a relatively simple key streamgenerator which

is initialized with a key of at most 128bit. See [ 1],[2],[5]

In this research a brief E0 algorithms is presented with two possible improvements are

listed.

2-Some Basic Concepts:

the cryptography system divided into crypto analysis (is the science of breaking the

cipher) and cryptography is divided into depending on encryption and decryption key

and Depending on Cryptographic Techniques :

1-Depending on encryption and Decryption Key :

A-Symmetric Algorithm

C=Ek(M) ,M=DK(C)

K is secret single key ,one key algorithm

i.e. the same key for encryption and decryption

Or the key of decryption .can be calculated from encryption key

B- Asymmetric Algorithm:(public key)Algorithm.

An advantages and disadvantages of

Block and StreamCipher

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

2

Two key: one for encryption and the second for Decryption.

i.e. C=Ek1 (M) ,M=Dk2(c) ,normally ,k1, is public ,k2 is secret.

2- Depending on Cryptographic Techniques:

I:Block Cipher

Let M be a plaintext message .A block cipher breaks M into successive blocks

M1,M2,,and enciphers for each M1with the same key k,that is

EK(M)=EK(M1)EK(M2).

Each block is typically several characters long.

Example(on block cipher):

1-play fair cipher: it is a block cipher of size 2 letters .

2-Hill cipher :it is a block cipher of size d letters.

3-DEScipher: it is a block cipher of size 64bits .

4-Electronic code Book code book.(ECB)

Corresponding plain text block to a cipher block

Manually: choose 1000-10,000 plain text blocks in a two part book: one for

encipherment sorted on plain text the second part sorted on cipher text .

Electronic: each key has different code book, book size is bigger than of manual.

5-transposition with period d character.

6-simple substitution with 1character.

7-Homophonic substitution with 1character .

8-Knapsack of length n bits.

II:StreamCipher

It is breaks the message M into successive characters or bits M1,M2,,and

enciphers each Mi with the it element ki of a key stream K=K1K2 That is

EK(M)=EK1(M1)EK2(M2)

Example(on streamcipher):

1-one time bits and Running key ciphers are non periodic .

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

3

2-vigenere cipher is periodic because plain text char are enciphered one by-one and

adjacent char are encipher with a different part of the key.

3-Auto key cipher: An Auto key cipher is example on self-synchronous such that the

key is derived from the message it encipher in vigeneres first cipher the key is formed

by appending the plain text M=m1m2 .to a "priming key" character ki ,the i-th key

character (i>1))starts with k1, next key ki=mi-1 or ci-1.

4-cipher feedback (CFB):it is another example on self- synchronous such that plain text

is encipher in small units (smaller than block size) .

A stream cipher is periodic if the key stream repeats after characters for some fixed d

otherwise it is no periodic.

III: There are two different approaches to streamencryption ,

1- Synchronous streamcipher: key streamis generated independently of the

plaintext stream.

2-Self-Synchronous streamcipher: each key character(or bit) is derived from a fixed

number n of preceding cipher text character (or bit),For more detail see [3],[4],[6]

IV:Linear Feedback Shift Registers

An n-stage liner Feedback Shift Registers (LFSR) consists of a shift register R=(rn,rn-1,.r1)

and a tap Sequence T=( tn,tn-1.,t1), where each ri and ti is one binary digit .At each

step ,bit ri is appended to the key stream ,bits rn,.r2 are shifted right ,and a new bit

derived from T and R is inserted into he left of the register .Letting R' =(r'n,r'n-1r'1)

denote the next state of R,we see that the computation of R' is thus :

r'i=r'i+1 i=1,.,n-1

r'n=TR= tiri mod 2=t1r1+t2r2+..tnrn

thus R'=HRmod 2, where His nn matrix

tn tn-1 tn-2 t3 t2 t1

1 0 0 0 0 0

H= 0 1 0 0 0 0

. . . . . .

0 0 0 0 1 0

An n-stage LFSR can generate pseudo random bit strings with a period of 2

n-1

.To

achieve this, the tap sequence before repeating .This will happen if the polynomial

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

4

T(x)=tnx

n

+tn-1x

n-1

+..+t1x +1,Formed the form the elements in the tap sequence

plus the constant 1,is primitive A primitive polynomial of degree n is an

irreducible polynomial that device x

2 -1

+1 , but not x

d

+1 for any that divides

2

n

-1primitive trinomials of the form T(X) =X

n

+X

a

+1are particularly appealing

,because only two stages of the feedback register need be taped see[2],[5].

The polynomial T(X) =X

4

+X+1 is primitive, so the register will cycle through all 15

nonzero bit combination in GF(2

3

)before repeating . Now as T(x) =X

4

+X+1 , tap

sequence T=(1,0,0,1),i.e. x

4

=1,x

3

=0,x

2

=0,x=1. the matrix His given by

1 0 0 1

H= 1 0 0 0

0 1 0 0

0 0 1 0

Starting Rin the initial state 0001.we have

0 0 0 1

1 0 0 0

1 1 0 0

1 1 1 0

1 1 1 1

0 1 1 1

1 0 1 1

0 1 0 1

1 0 1 0

1 1 0 1

0 1 1 0

0 0 1 1

1 0 0 1

0 1 0 0

0 0 1 0

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

5

The rightmost column gives the key streamk=100011110101100.for more detail

see [2],[3],[4]

3.Previous Attacks on E0:

As is usual in cryptanalysis ,we focus on known plaintext attacks, i.e.we assume

a situation in which the attacker is able to obtain a certain amount of decrypted

text in one way or another . The goal of a known plaintext attack is to use this

information to recover other (unknown) parts of the plaintext .In the case of

additive stream ciphers, this problem reduces to finding a way to predict the

entire key streamzt given a limited number of key streambits.

To derive the output bits of the key stream generator described in the previous

section ,at least two fundamentally different methods:

1:Correlation Attacks.

2: Guess and Determine Attacks.

4.Advantages of block cipher:

1-It is some what faster than stream cipher each time n characters

executed.

2-Transmission errors in one cipher text block have no affect on other

blocks.

3-Not sufficient in hardware but may be used to connect keyboard to

cpu(central process unit) because the keyboard is slowly and the

transmission data between keyboard and cpu passed through bandwidth

8-bit or 8-character.

4-Block ciphers can be easier to implement in software ,because the

often avoid time-consuming bit manipulations and they operate on data

in computer-sized blocks

5-More suitable In trading applications.

6-Short blocks at the end of a message must also be added with blank or

zero.

7-In the real world block ciphers seem to be more general (i.e. they can

be used in any of the four modes, the modes is ECB, CBC,OFB, CFB).

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

6

5. disadvantages of block cipher: :

1-Identical blocks of plaintext produce identical blocks of cipher text .

2-Easy to insert or delete blocks .

3-modifying blocks .

4-Block encryption may be more susceptible to cryptanalysis than either

stream mode.

Because identical block of plain text yield identical blocks of cipher text.

5-Block encryption is more susceptible to replay than stream encryption if

each block is in dependently encipher while the same key one block can

be replayed for another.

6. advantages of streamcipher :.

1-Stream cipher that only encryption and decryption data one bit at a

time are really suitable For hard ware implementation .

2-Stream cipher it is lase than susceptible to cryptanalysis than either

block mode because identical parts of M are encipher with different parts

of the key streams.

3-Streamcipher is lase than to vulnerable to insertion or deletion of block.

4-Easy to analyze mathematically .

5-The key stream is generated independently of the message stream.

6-More suitable in military applications.

7-Synchronous stream cipher protect against cipher text searching

because identical block of characters in the message stream are

enciphered under a different part of the key stream.

8-In self-synchronous stream cipher each key character is derived from a

fixed number n of preceding cipher text characters( or bits).

9-Self-synchronous streamciphers are non-periodic because each key

character is function dependent on the entire preceding message stream.

10-Self synchronous cipher protect a against cipher text searching

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

7

because different parts of the message streamare enciphered under

different parts of the key stream.

11-Self synchronous cipher protect against all type of authenticity threats

because any change to the cipher text affects the key streamindeed the

last block of cipher text is functionally dependent on the entire message

serving as a checksumfor the entire message.

7.Disadvantage of streamcipher:.

1-Transmission error in 0ne cipher text block have affect on other block

such that if a bit lost or a altered during transmission the error affect the n

character and cipher resynchronous it self after n correct cipher text char.

2-It is slower than block but we can make it more fast by implemented in

special purpose hardware capable of encryption several million bits for

second.

3-If the key short length it is mean repeat faster ,so it is because same

block .

4-Not suitable in the software .

5-In synchronous stream cipher if a cipher text character is lost during

transmission the sender and receiver must resynchronous their key

generators before they can proceed further.

6-In self synchronous stream if a cipher text character is lost or altered

during transmission ,the error propagates forward for n characters. But the

cipher resynchronous by itself after n correct cipher text characters have

been received.

7-Synchronous stream cipher is periodic because key stream is repeater

after d character.

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

8

8.Conclusions:

1-The statistical attack cannot be applied to the actual E0 algorithm ,as

it assumes sequences of consecutive key streambits which are

considerably longer than the maximumpacket size.

2-so that to determine which is better to use the block or streamcipher

is depends on the requirement of the particular application we can

make some general observation about the efficiency and security of

the different approaches.

3-we notice that in Bluetooth method the stream cipher is used

because the transmission is wireless and for the security side the

connection between two person for sent information( message ,picture

and phone number,.etc) i.e. between two mobile or between two pc

computer or between pc computer and mobile such that in this

method the mobile is work same flash Rom, using method of

cryptography (Correlation, Guess methods) for this purpose .

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

9

Reference

[1] Bruces. Applied cryptography, second edition,

published by john Wiley and sons ,inc.1996.

[2] Christophe De Canniere ,Thomas Tohansson and Bart

preneel cosic internal report- "Cryptanalysis of the blue

tooth stream cipher"2001.

[3] J EAN_PAUL TREMBLAY ,PAUL G.SOR ENSON AN

introduction to data structures with application by mc

Graw_Hill,inc,1984.

[4] J ennifer s. and J osef p.cryptography:An introduction to

computer security,1989 by prentice Hall of Astralia pty lid.

[5] Shimada M.Another practical public key

cryptosystem,Electronics letters,vol. no.23,1992,p.2146-

2147.

Created by PDF Generator (http://www.alientools.com/), to remove this mark, please buy the software.

- CNS MCQ QUIZUploaded byHaarish Tomar
- Cryptography Quest Bank 02Uploaded byGurpreet Singh
- hmw3_solUploaded byNikhil Kataria
- VIDEOSECURITY_SYNOPSISUploaded byDeven Patil
- Cryptography TutorialUploaded bybob
- Cryptography TutorialUploaded bySaiTeja
- Cast-As-Intended Mechanism With Return Codes Based on PETsUploaded byvladiprocop
- Hill CipherUploaded byperhacker
- Exercise 1Uploaded byKien Nguyen Trung
- 50120130406002Uploaded byIAEME Publication
- V01I031126Uploaded byIJARTET
- IJACSA_Volume2No11Uploaded byEditor IJACSA
- CCNASv1.1 Chp07 Lab-A Explor-Encrypt InstructorUploaded byclearmoon247
- Key StreamUploaded byKarthikeyan
- DBMS EncryptionUploaded byKasser Ismael
- CryptographyUploaded bymaaadu
- Cryptosystems based on Chebyshev Polynomials - ReportUploaded byteknikqa
- IJCST-V2I4P11 Author:P.J.Thangamani;G.NagalakshmiUploaded byEighthSenseGroup
- An More effective Approach of ECC Encryption Algorithm using DNA ComputingUploaded byEditor IJRITCC
- Secure Auditing In CloudUploaded byIJIRST
- DMR Encryption Application Notes R1.2Uploaded byfakemailutanetat
- Implementation of Modulo 2n-1 Multiplier Using Radix-8 Modified Booth AlgorithmUploaded byUday Rao
- 6_sem_sylUploaded byDivya Kannan
- Aes on Gpu ReportUploaded bymilmar1970
- Public Key CryptographyUploaded byPranav Mittal
- How DES Works in DetailUploaded byibraakindeji
- tretretre.txtUploaded byChurst Brown
- Full TextUploaded byRama Devi
- DesUploaded byBARNALI GUPTA
- RsaUploaded byHimanshu Suryawanshi

- tifsUploaded byKwesi Setsoafia Agudetse
- UNIT-5Uploaded byKwesi Setsoafia Agudetse
- java mainUploaded byKwesi Setsoafia Agudetse
- Web BasedOpenATSplatformforApplicationProcessing(Synopsis)Uploaded byKwesi Setsoafia Agudetse
- Intel Snmp Subagent User Guide1Uploaded byKwesi Setsoafia Agudetse
- Block fiUploaded byKwesi Setsoafia Agudetse
- Input Devices Student NotesUploaded byFreyja Thorpe
- 1654Uploaded byKwesi Setsoafia Agudetse
- The Theory of Attitude Formation and ChangeUploaded byHitesh Rajwar
- AdtUploaded byswapnilac
- Shopping SrsUploaded byedufever
- Solution Manual to Chapter 56Uploaded byKwesi Setsoafia Agudetse
- sound and multi mediaUploaded byKwesi Setsoafia Agudetse
- Atm Agency Agreement New PDF DocUploaded byKwesi Setsoafia Agudetse
- Online ShoppingUploaded byVaryam Pandey

- 10811953CSE403Uploaded byGulfam Ali
- Python PracticalsUploaded byvineeth george
- Cryptography and CodingUploaded byAriel López
- Borromean Draft 0.01 34241bbUploaded byJarkko Lehto
- Final Exam - Evaluación final_ Cybersecurity EssentialsUploaded byVicente Romero
- A Secure, Configurable and Customized Multimode Bulk EncryptorUploaded byHassaan Alsyed
- Cs 701[July 2017iiitk] l3&l4Uploaded byjai jaiswal
- IEEE 802.11 TerminologyUploaded byclu5t3r
- pki_opensslUploaded bygdeepthi
- Attacking.phone .Privacy Karsten.nohl 1-1Uploaded bymotash
- crypto4aUploaded bymbscribd2011
- isUploaded byVijai Kumarr Gottipati
- Security Enhancement Using NTRU Algorithm Based Cryptosystem for Communication of Classified Information Via CloudUploaded byEditor IJTSRD
- AdiShamir SCAUploaded bydeeppockets
- Secured Key Distribution Techniques in Wireless Sensor Networks-150429171406Uploaded byijtimes
- 113693704 Contoh Proposal Usaha WarnetUploaded byRayanQardhafi
- fips1402igUploaded byanon_70198840
- Crypto 101Uploaded byAshley Fourie
- EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMSUploaded byDr. Ahmed Elngar
- 10. PGP Key.pdfUploaded bySyahmi Isahak
- 210-260 Exam Dumps With 100% Passing GuaranteeUploaded byRoger
- NS01Uploaded byShailendra Porwal
- GET VPN - Knowledge BaseUploaded byzorg platz
- ISA 656 F07 ReviewUploaded byhknet
- CaveUploaded bybambangsub
- DWlinkUploaded byHoàng Đức Nhuận
- TLS & SSLv3 renegotiation vulnerability explainedUploaded bythierryzoller
- Privacy Preserving Ranked Multi-KeywordUploaded bysv
- Enhanced Identity Based Cryptography for Efficient Group Key Management in WSNUploaded byAnonymous vQrJlEN
- Crypto 101Uploaded byalboracle